Search by Theme

This visualization shows datasets by tag. Each bubble represents
a tag and the size corresponds to the number of related datasets. When two
bubbles overlap, this means they share a common tag. Navigate the menu to
show tags on the basis of how many datasets are tagged with a term. For
example, <100 will exclude tags that have more than 100 datasets. >100 will
exclude tags that have less than 100 datasets. You may refine your results
by adding filters, available in the menu below

This file contains programme budget figures (Regular Resources, Other Resources - Regular and Emergency), allocations and expenditure data for all UNICEF Output level results which have had at least one transaction recorded against them since Jan 01, 2012. Data on sectors funded, grant donors and results is also included. The contents of the datasets are updated on a monthly basis.

With the establishment of the Knowledge Sharing Center composed by the Department of Research and the Department of Statistics, compiling all the microdata sets held by many units throughout the Office has been identified as a core part of our statistical strategy, in order to build a common repository of microdata to be widely used by all officials to carry out their research and analysis activities.

The YouthPOL eAnalysis, is the ILO’s global database on youth employment policies. Through this platform, you will be able to access data on currently enforced policies affecting youth employment across the world. The database is a product supported by multiple partners and ILO offices and units. More details are available on the YouthPOL homepage.

Cybersecurity training for law enforcement officers, judicial, and other legal actors designates professional and technical, potentially recurring, training for police officers, enforcement agents, judges, solicitors, barristers, attorneys, lawyers, paralegals and other persons of the legal and law enforcement profession.

The existence of a government‑approved (or endorsed) framework(s) for the implementation of internationally recognized cybersecurity standards within the public sector (government agencies) and within critical infrastructure (even if operated by the private sector).

The existence of a national agency dedicated to child online protection, the availability of a national telephone number to report issues associated with children online, any technical mechanisms and capabilities deployed to help protect children online

The existence of any officially recognized national or sector‑specific benchmarking exercises or referential used to measure cybersecurity development, risk-assessment strategies, cybersecurity audits, and other tools and activities for rating or evaluating resulting performance for future improvements

Efforts to promote widespread publicity campaigns to reach as many people as possible as well as making use of NGOs, institutions, organizations, ISPs, libraries, local trade organizations, community centres, computer stores, community colleges and adult education programmes, schools and parent‑teacher organizations to get the message across about safe cyber‑behaviour online.

The existence and the promotion of national education courses and programmes to train the younger generation in cybersecurity-related skills and professions in schools, colleges, universities and other learning institutes

Any officially recognized or ratified national or sector‑specific partnerships for sharing cybersecurity information or assets across borders by the government with one other foreign government, regional entity or an international organization

Any officially recognized or ratified national or sector‑specific programmes for sharing cybersecurity information or assets across borders by the government with multiple foreign governments or international organizations

The commitment of governments to participate in Cybersecurity events is hereby measured. Such events include regional and international workshops, conferences and trainings. The World Summit on Information Society, Regional Cybersecurity forum, Regional Cyberdrills, FIRST annual summit and technical colloquia, the Global Forum on Cyber Expertise (GFCE), the Internet Governance Forum as well as conferences by AfricaCERT, APCERT, OICCERT,GCC,OAS are such examples.

The number of officially recognized national or sector‑specific PPPs for sharing cybersecurity information (threat intelligence) and assets (people, processes, tools) between the public and private sector (i.e. official partnerships for the cooperation or exchange of information, expertise, technology and/or resources), whether nationally or internationally

Cybercrime legislation designates laws on the unauthorized (without right) access, interference, interception of computers, systems and data. The laws can be ranked by level: none, partial or comprehensive.

This indicator measures the existence of a government-approved (or endorsed) framework (or frameworks) for the implementation of internationally recognized cybersecurity standards within the public sector (government agencies) and within the critical infrastructure (even if operated by the private sector).

This indicator measures the existence of a government-approved (or endorsed) framework (or frameworks) for the certification and accreditation of national (government) agencies and public sector professionals by internationally recognized cybersecurity standards.